background image

Internet Guard Dog

User’s Guide

Version 3.0

Содержание INTERNET GUARD DOG 3.0

Страница 1: ...Internet Guard Dog User s Guide Version 3 0...

Страница 2: ...n WebShield WebSniffer WebStalker WebWall and ZAC 2000 are registered trademarks of Network Associates and or its affiliates in the US and or other countries All other registered and unregistered trad...

Страница 3: ...the limitations or other requirements described herein Upon any termination or expiration of this Agreement you must destroy all copies of the Software and the Documentation You may terminate this Ag...

Страница 4: ...at McAfee s option either i return of the purchase price paid for the license if any or ii replacement of the defective media in which the Software is contained You must return the defective media to...

Страница 5: ...ation by the United States Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement 9 Export C...

Страница 6: ...us This Agreement is governed by the laws of the United States and the State of California without reference to conflict of laws principles The application of the United Nations Convention of Contract...

Страница 7: ...Chapter 2 Installing Internet Guard Dog 11 System requirements 11 Installing Internet Guard Dog 12 Troubleshooting installation problems 12 Step 1 Clean up your hard drive 13 Step 2 Remove temporary...

Страница 8: ...ocker alert message 32 Why should I change my Cookie Blocker settings 33 What Identity Protector does 33 Responding to an Identity Protector alert message 34 Why should I change my Identity Protector...

Страница 9: ...I do to keep my stuff safe 59 How can I tell if a Web site is secure 59 How does encryption work 60 Security on the Web 61 Nasty applets 62 Can I prevent programs from accessing the Internet 62 Comput...

Страница 10: ...Table of Contents x Internet Guard Dog Technical support 70 McAfee training 71...

Страница 11: ...thout getting out of your bathrobe However with all these conveniences come a certain element of risk When you use the Internet information is transmitted from your computer to other computers in the...

Страница 12: ...Security Features VirusScan Internet Guard Dog now uses the McAfee VirusScan to address virus related problems you may encounter through the Internet This feature allows you to set how to perform a vi...

Страница 13: ...ISP acts as a middleman between you and the Internet Your computer connects using your modem to the ISP s equipment which in turn connects to the Internet You may also be connected to the Internet th...

Страница 14: ...request at one Web site from being passed along to the next site you visit Without Search Filter your browser can transfer your search request information from one Web site to another without your kno...

Страница 15: ...inistrator customizing settings for other users of the same computer Internet Filtering options After an Administrator has added profiles of other users of the computer Internet Filtering options can...

Страница 16: ...s such as financial records and credit card numbers so they ll never be sent over the Internet without your OK Encrypt sensitive files Add an extra layer of protection by encoding files to prevent the...

Страница 17: ...ew window Table 1 1 To find out Read What this version of Internet Guard Dog does and how to find information about Internet Guard Dog Chapter 1 Welcome to Internet Guard Dog System requirements and h...

Страница 18: ...previous browse button if activated or click the Back button Find tab Clicking the Find tab enables you to launch a full text search When you search for topics via the Find tab for the first time a Fi...

Страница 19: ...Welcome to Internet Guard Dog To get help for settings in a dialog box Whenever you see the button in the upper right corner of a dialog box click the button then click on the setting for which you wa...

Страница 20: ...Welcome to Internet Guard Dog 10 Internet Guard Dog...

Страница 21: ...best in a resolution of 800x600 pixels or greater and a color palette of 32 000 color mode 15 bit or higher 256 color palette is supported but may cause some color changes caused by palette swapping...

Страница 22: ...setup If D is not the drive letter of your CD ROM drive substitute the correct drive letter 4 After installation is completed Internet Guard Dog s Interview feature is launched Follow through the scr...

Страница 23: ...scanning your drive for errors Depending on the size of your hard drive ScanDisk may take several minutes to complete its job 5 When ScanDisk is finished close ScanDisk 6 Click Start on the Windows ta...

Страница 24: ...1 Hold down the Ctrl and Alt keys on your keyboard and then press the Delete key once The Close Program dialog box appears 2 Click End Task for every item on the list except Explorer 3 Repeat steps 2...

Страница 25: ...ty and privacy settings that are appropriate for most users some features require your input The Interview provides an easy means of customizing your Internet Guard Dog settings Each interview screen...

Страница 26: ...e number E mail address Other financial numbers such as bank account brokerage account credit card phone card and so on Any Web site login names and passwords that you want to store in Password Manage...

Страница 27: ...e in the Interview feature of Internet Guard Dog And only the designated Administrator can access and change information and protection settings of the computer After this setup is complete the Admini...

Страница 28: ...our CheckUp Settings or Protections Settings Also Internet Guard Dog won t let you use the Password Manager information in Browser Buddy or send out information protected by Identity Protector WARNING...

Страница 29: ...on the Web Display the McAfee Software Support page in your Web browser Help then select Internet Guard Dog on the Web Access the McAfee Web site McAfee com Display the Support FAQ page in your Web br...

Страница 30: ...net filtering options and can even monitor their browsing habits User Profile To customize protection settings for another user click User Setup from the Internet Guard Dog Home page the User Setup sc...

Страница 31: ...ocker Select this option if you want Internet Guard Dog to block certain ads that you do not want the user to view Allow Chat Select this option if you want to allow the user to go into online chat ro...

Страница 32: ...ways on duty in the background to protect your computer s data and your privacy based on the choices you make Internet Guard Dog displays settings on a series of Protection Settings pages containing c...

Страница 33: ...blems you may encounter through the Internet This feature allows you to set how to perform a virus scan operation on your computer what to do if a virus is found and how it should alert you once the v...

Страница 34: ...uses and Internet threats when you update its program files and virus patterns over the Internet NOTE If you purchased Internet Guard Dog on CD you should run Update even if you ve just installed Inte...

Страница 35: ...ecurity Check more frequently You can also change the Security Check settings to customize how you want this feature to work on your computer To perform a Security Check 1 Click Security Check on the...

Страница 36: ...askbar NOTE If you see an Internet Guard Dog alert message see Responding to Internet Guard Dog alert messages later in this chapter Using the Internet Guard Dog shortcut menu Even when you aren t run...

Страница 37: ...disruption TIP If you decide you no longer want to see an alert message use the question mark button in the alert message to find out what setting to change All of the settings that control the alert...

Страница 38: ...site address in the Username text box type the name by which you identify yourself to this Web site this may correspond to User Name Member ID Member Name Login ID or Login Name and so on 3 In the Pa...

Страница 39: ...e unreadable You must decode or decrypt the file before you can use it The file encryption in Internet Guard Dog is designed so that you can easily encrypt or decrypt all of the files that you designa...

Страница 40: ...Quick Tour of Internet Guard Dog 30 Internet Guard Dog...

Страница 41: ...ookies Accept all cookies Display an alert message each time a cookie is sent to your browser The alert displays the name of the entity trying to set the cookie and provides you the option either to a...

Страница 42: ...st time If you want to remove cookies for a site from which you ve previously accepted cookies run a Security Check and remove the cookies for that site TIP You can run Security Check so that it only...

Страница 43: ...on over the Internet to an unsecure site Although you don t have to worry about a site when it using a secure connection there are many Web sites that use a secure connection only when dealing with cr...

Страница 44: ...nformation go out Block the information from going out Display an alert message when any application tries to send the information over the Internet to an unsecure site This is the response that Inter...

Страница 45: ...elect Allow Always Create an Internet Guard Dog password If the Internet Guard Dog password is not entered after you start Windows an unauthorized user of your PC can t view or send out your personal...

Страница 46: ...list of favorite sites because it is less likely that you ll return to these sites If you don t return to a site the cached files for the site are never used again they just sit and take up disk space...

Страница 47: ...r selected in the Security Settings of Internet Guard Dog it automatically removes search information before you go to another Web site Internet Guard Dog does not display an alert message for this fe...

Страница 48: ...Privacy Features 38 Internet Guard Dog...

Страница 49: ...esponding to Gatekeeper alert messages Internet Guard Dog can display five different Gatekeeper related alert messages If you are using the default settings suggested by the Interview you will see the...

Страница 50: ...you haven t allowed the program to always open the other program Internet Guard Dog displays an alert message Table 5 1 If you choose Internet Guard Dog This time only Allows the program to access th...

Страница 51: ...age in the following ways Table 5 2 If you choose Internet Guard Dog does this Allow always Allows the program to start the other program Not this time Prevents the program from starting the other pro...

Страница 52: ...ogram is using your modem to dial out My modem dials silently Want to be warned when a program starts up another program Many newer programs will warn you before doing this but older programs may not...

Страница 53: ...related alert messages If you are using the default setting suggested by the Interview you will only see guarded file ActiveX scan ActiveX delete and drive format messages Guarded file alert message U...

Страница 54: ...legitimate reasons for allowing an ActiveX control to delete files For example if a control installs special software on your PC to let you interact with its Web site the control may need to delete f...

Страница 55: ...tarted the format command If you don t know why your disk is being formatted note the name of the program in the alert message and then turn off your computer using its power switch If the program has...

Страница 56: ...orary files that it uses If you are concerned check with the site that sent you the control ActiveX deletes files from my drive Want to be warned when any program tries to format any of your drives An...

Страница 57: ...r more information see Using Browser Buddy to retrieve or store your Web site passwords in Chapter 3 To add a password record 1 In the Internet Guard Dog Home screen click the Options menu then select...

Страница 58: ...Security Features 48 Internet Guard Dog To remove a password record In the Password Manager list click a record to select it then click Remove...

Страница 59: ...inimum of configuration options but with the full power of the VirusScan anti virus scanning engine the VirusScan Advanced mode adds flexibility to the program s configuration options including the ab...

Страница 60: ...e to display a list of quarantined files The Quarantine feature allows you to isolate an infected file in order to avoid spreading a virus Click Update to check for updated versions of VirusScan and D...

Страница 61: ...an To perform a scan operation VirusScan needs to know what you want it to scan what you want it to do if it finds a virus and how it should let you know when it has You can also tell VirusScan to kee...

Страница 62: ...by automatically taking an action that you determine ahead of time You can specify which response options you want VirusScan to give you when it finds a virus or which actions you want it to take on...

Страница 63: ...appears when VirusScan finds an infected file This alert message can contain any information from a simple warning to instructions about how to report the incident to a network administrator This sam...

Страница 64: ...file option By default VirusScan writes log information to the file VSCLOG TXT in the VirusScan program directory You can enter a different name and path in the text box provided or click Browse to l...

Страница 65: ...built into the operating system The increased traffic in larger networks requires the services of a special computer called a server Servers help larger networks operate by figuring out how to route...

Страница 66: ...cause some of the packets to be delayed so they arrive out of order To compensate TCP examines each packet as it arrives to verify that it s OK Once all the packets are received TCP puts them back in...

Страница 67: ...ck and consider the range of sensitive transactions we make every day As an example consider a simple ATM transaction We assume that following conditions prevail whenever we use our ATM cards Privacy...

Страница 68: ...nistrators track down networking problems Unfortunately the same tool can also be used to steal information Sniffers are insidious and difficult to detect Sniffing often begins when a hacker breaches...

Страница 69: ...ions of Netscape Communicator and Microsoft Internet Explorer use a visual cue to tell you that the site is secure For more information see How can I tell if a Web site is secure NOTE Guard Dog s Chec...

Страница 70: ...know your bank account number Authentication usually entails entering a user ID and a password To circumvent intercepted passwords and IDs authentication employs encryption to scramble this informatio...

Страница 71: ...some sites in the United States use a higher level of 128 bit encryption The number of bits indicates the length of the key used to encrypt data The longer the key the stronger and more secure the enc...

Страница 72: ...g anyone However there is no guarantee that an attack will not happen in the future Can I prevent programs from accessing the Internet You can use Guard Dog to specify the applications that are allowe...

Страница 73: ...ed program Boot viruses or Master Boot Record viruses The boot sector of a disk is a physical location on the disk that contains information about the disk and the files it contains All disks and driv...

Страница 74: ...nfecting your PC Viruses are spread when infected diskettes are shared between PCs and when you download and run infected files from on line services bulletin boards or the Internet Another potential...

Страница 75: ...of magazine subscribers or mail order companies can be sold to others Some companies allow you to specify that you do not want to receive mailings or to have your name and address sold to other compan...

Страница 76: ...more information see What Cookie Blocker does on page 31 Sources for Internet privacy and security information Finding out about Internet hoaxes The United States Department of Energy Computer Incide...

Страница 77: ...ational Institute of Health s Computer Security Information site Good links to many security information sites http www alw nih gov Security security html Microsoft s Security site White papers and de...

Страница 78: ...Internet Security and Privacy 68 Internet Guard Dog...

Страница 79: ...ersion of system software Amount of memory RAM Extra cards boards or monitors Name and version of conflicting software EXACT error message as on screen What steps were performed prior to receiving err...

Страница 80: ...have continued this tradition by making our site on the World Wide Web http www mcafee com a valuable resource for answers to technical support issues We encourage you to make this your first stop for...

Страница 81: ...e support and 24 hours a day 7 days a week for Per Minute or Per Incident support McAfee training For information about scheduling on site training for any McAfee product call 800 338 8754 Disclaimer...

Страница 82: ...Product Support 72 Internet Guard Dog...

Страница 83: ...tector 34 Web Trail Cleaner 36 audible alert messages sounding 53 B bookmarks 36 boot sector viruses 63 Browser Buddy adding a new password record 28 dragging passwords from 28 opening 28 Password Man...

Страница 84: ...ActiveX controls 43 protecting with File Guardian 43 VSCLOG TXT as VirusScan log 53 folders choosing as scan targets 52 G Gatekeeper alert messages 39 any credit card number goes out alert message 41...

Страница 85: ...security Guard Dog solutions 3 Interview 15 J Java and viruses 64 L Log 2 23 log file creating with text editor 53 VSCLOG TXT as 53 login names 47 M macro viruses 63 managing Web passwords 27 Master...

Страница 86: ...indows password file 43 Protection Settings Cookie Blocker 33 File Guardian 46 Gatekeeper 42 Identity Protector 35 Password Manager 47 Search Protector 37 Web Trail Cleaner 37 Q quarantine folder use...

Страница 87: ...h Browser Buddy 28 dragging from Browser Buddy 28 V viruses ActiveX and 64 e mail attachments and 63 e mail messages and 63 file and program 63 hoax 63 how dangerous 63 how spread 62 Java and 64 macro...

Страница 88: ...Index 78 Internet Guard Dog Windows protecting password file 43 taskbar 26 using help 7 Windows Start menu using to start VirusScan Classic 49...

Отзывы: